Sciweavers

74 search results - page 14 / 15
» Fully Leakage-Resilient Signatures
Sort
View
MICCAI
2010
Springer
13 years 3 months ago
Intra-Patient Supine-Prone Colon Registration in CT Colonography Using Shape Spectrum
CT colonography (CTC) is a minimally invasive screening technique for colorectal polyps and colon cancer. Since electronic colon cleansing (ECC) cannot completely remove the presen...
Zhaoqiang Lai, Jiaxi Hu, Chang Liu, Vahid Taimouri...
CVPR
2007
IEEE
14 years 7 months ago
Beyond bottom-up: Incorporating task-dependent influences into a computational model of spatial attention
A critical function in both machine vision and biological vision systems is attentional selection of scene regions worthy of further analysis by higher-level processes such as obj...
Robert J. Peters, Laurent Itti
OSDI
2004
ACM
14 years 5 months ago
Automated Worm Fingerprinting
Network worms are a clear and growing threat to the security of today's Internet-connected hosts and networks. The combination of the Internet's unrestricted connectivit...
Sumeet Singh, Cristian Estan, George Varghese, Ste...
CORR
2010
Springer
82views Education» more  CORR 2010»
13 years 5 months ago
Expansion and Search in Networks
Borrowing from concepts in expander graphs, we study the expansion properties of real-world, complex networks (e.g. social networks, unstructured peer-to-peer or P2P networks) and...
Arun S. Maiya, Tanya Y. Berger-Wolf
RAID
2004
Springer
13 years 10 months ago
HoneyStat: Local Worm Detection Using Honeypots
Worm detection systems have traditionally used global strategies and focused on scan rates. The noise associated with this approach requires statistical techniques and large data s...
David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, Ju...